Your review has been sent successfully

F5 Networks Alert

3291
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

26 August, 2020

● High

2020-1687

All

Description:

F5 Networks has released security updates and alerts to address multiple vulnerabilities in the following products:

  • BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
    • 15.1.0
    • 15.0.0 - 15.1.0
    • 14.1.0 - 14.1.2
    • 13.1.0 - 13.1.3
    • 12.1.0 - 12.1.5
    • 11.5.2 - 11.6.5
  • BIG-IQ Centralized Management
    • 7.0.0
    • 6.0.0 - 6.1.0
    • 5.4.0
  • Traffix SDC
    • 5.0.0 - 5.1.0

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Man in the middle attack.
  • Cross-site scripting (XSS) attack.
  • Cross-site request forgery (CSRF).
  • Read sensitive files in the root directory.
  • SQL injection.
  • Execute arbitrary code.

Best practice and Recommendations:

The CERT team encourages users to review F5 Networks security advisory and apply the necessary updates:

F5 Networks also recommends taking the following preventive measures:

  • Secure access to the BIG-IP system to ensure that the TMUI is only accessible by trusted users.
  • Permit management access to the BIG-IP ASM system over a secure network and limit shell access to only trusted users.

Last updated at 26 August, 2020

Rate the content

rate-icon
up icon